Service-Oriented Advanced Metering Infrastructure for Smart Grids

Size: px
Start display at page:

Download "Service-Oriented Advanced Metering Infrastructure for Smart Grids"

Transcription

1 Journal of Energy and Power Engineering 5 (2011) Service-Oriented Advanced Metering Infrastructure for Smart Grids S. Chen 1, J.J. Lukkien 1 and L. Zhang 2 1. Department of Mathematics and Computer Science, Eindhoven University of Technology, Eindhoven 5600 MB, Netherlands 2. East-China Power Dispatching Center, East-China Grid Group Company, Shanghai , China Received: July 26, 2010 / Accepted: October 20, 2010 / Published: May 31, Abstract: Advanced Metering Infrastructure (AMI) enables smart grids to involve power consumers in the business process of power generation transmission, distribution and consumption. However, the participant of consumers challenges the current power systems with system integration and cooperation and security issues. In this paper, the authors introduce a service-oriented approach to AMI aiming at solving the intercommunication problem and meanwhile providing a trust and secure environment for smart grids. In this approach heterogeneous systems expose services to the network. System integration and cooperation are done through service composition. A generic service interfacing method is designed to develop standardized services for heterogeneous power systems. Moreover, role-based access control mechanism is used to guarantee the secure access to smart grids. With the seamless communication between consumers and power systems and among power systems themselves, this service-oriented AMI can associate consumers with actual system workload and furthermore support the intelligent running of power systems. Key words: Smart grids, AMI, service-oriented, generic interfacing, access control. 1. Introduction Smart grids advocate the participant of consumers in the power business process including power generation, transmission, distribution and consumption [1-3]. Through collecting consumers motivation, their monitoring result on delivered power quality, and feedback, power product providers and operators can shape their market models according to the real demand, dynamically distribute their power transmission, achieve network optimization, and provide high quality of service to their consumers. This requires smart grids must a) provide new functionality that enables the involvement of consumer, b) deal with the collaboration of heterogeneous systems including smart sensors, smart meter monitoring systems, various back-end power Corresponding author: S. Chen, Ph.D., assistant professor, research fields: sensor networks, components based architecture, security and resource management. shudong.chen@tue.nl. information systems (distribution system, accounting and billing system, etc.), c) guarantee the secure communication between consumer and back-end systems and that among back-end systems. In order to achieve these goals, Advanced Metering Infrastructure (AMI) is proposed which uses two-way communications, advanced sensors, and distributed computing to improve the efficiency, reliability and safety of power delivery and use [4, 5]. AMI has been national widely deployed including Italy, Sweden and Finland, etc. However, by the nature of distributed power transmission and distribution environment, power information systems consist of heterogeneous networks, performing communication using different communication protocols. Even in the same network there may exists heterogeneity between development languages, deployment hardware and system structures (database, I/O interface, etc.). Moreover, they are tightly coupled with the security distribution policy and horizontal segregation of networks. Some of them are

2 456 Service-Oriented Advanced Metering Infrastructure for Smart Grids even running individually. As a consequence, system interactions are rather difficult. Increasing deeply system integration, seamless communication, cost, and safety requirements of smart grids reveals the need for a flexible, reliable, reusable, as well as trustable architecture for AMI. Service-orient technology [6, 7] provides a solution to solve system cooperation in a distributed environment. Applications can be achieved through coordinating and connecting independent functional entities (services). Services expose well-defined interfaces to the network and are defined independent of hardware platforms, operating systems and programming languages. This makes it possible to interact in a uniform and universal way between services or systems. Therefore, in this paper, we propose a service-oriented AMI. We envisage a smart grids system as an environment in which functionalities are provided as scalable services. Users, which include power providers, operators and consumers, can simply interact with the system without knowing how to access and control these services. The service-oriented framework will support the interactions of services provided by heterogeneous systems where issues including security, cooperation, atomization, and dynamic adaptive will be considered. The remainder of this paper is organized as follows. In section 2 we describe the service-oriented AMI for smart grids followed with detailed design of the generic service interfacing method A_ITF and working principle of the role-based access control mechanism. In section 3 we analyze the feasibility of our design together with a tooling support A_MAP. Finally we summarize and conclude in section The Design of a Service-Oriented AMI 2.1 Service-Oriented AMI Different from the traditional power systems, a novel feature of smart grids is using AMI to setup the connection of power systems with their consumers. AMI grants consumers with capability to support the intelligent running of power systems. Customs can check the delivered power quality through monitoring the smart meters installed along the power transmission, distribution and user path. Under special circumstances, for instance, disturbing or theft happen, they can inform or be informed by the custom service center. They can specify their requirement based on actual requirements and available rate models. Moreover, their activities can be collected for power operators to make new energy marketing strategies. AMI also provides time stamped system information for the back-end system analysis. For instance, through reading smart meters, network performance will be monitored. Subsequently, alarm, dynamic dispatching and work load forecast can be achieved. Additionally, system self healing functionality can also be provided. Fig. 1 shows the service-oriented AMI design which includes a custom portal (load management system) and some example power systems. Functionalities of all the subsystems are represented as services. We also wrap the modules of existing power systems as services, for example, the smart meter reading will be done by calling distributed meter reading services running on smart meters. 2.2 Business Process Lifecycle in Service-Oriented AMI In a smart grids system, a business process, which is also called an application, is achieved through service coordination and connection. A power operator wants to add a new function to the smart grids system, for example, to let customers be informed with new power products and according rating model. To enable this, an orchestrator, on behalf of the operator, will follow the steps, depicted in Fig. 2 to construct such a business process then publish as an application in the system for later use. The lifecycle of a business process consists of the following phases: (1) Service development and deployment: a service provider exposes a set of functions in the form of a generic service to the network. (2) Service advertisement: when a new service is available, it makes its presence known to other services

3 Service-Oriented Advanced Metering Infrastructure for Smart Grids 457 Fig. 1 Service-oriented advanced metering infrastructure. Fig. 2 Lifecycle of a business process in service-oriented advanced metering infrastructure. on the network. If there is a repository service, it sends out the advertisement through broadcast or multicast. Services who are interested in this repository record this information and register themselves at this repository next. If there is no repository available, services broadcast themselves. (3) Realize an application: when there is a requirement of an application, an orchestrator is going to achieve it through service combination following the below steps. Service discovery: the orchestrator discovers required services. It sends out service queries and then receives a list of available services with required functionalities. Service binding: the orchestrator informs specific services to bind with each other in an order according to the application logic. During this process, the orchestrator checks the match between services, e.g.,

4 458 Service-Oriented Advanced Metering Infrastructure for Smart Grids the interfaces and the communication protocols. Service invocation: this is the stage where a service is connected and invoked after the application starts. A service is called directly by another service. Although control is still done by the orchestrator, as shown in steps 3.31 and 3.4, the orchestrator is no longer involved in service function invocation. Run time service management: during the application execution, in order to guarantee the overall performance, e.g., the throughput of a service and robustness of the whole system, services are monitored and managed about their availability and resource usage. (4) Service unbind: after the application finishes, the orchestrator orders services to disconnect from their bound services, clean up whatever state needs to be removed and relinquish the control which is implicitly transferred upon binding. 2.3 A_ITF: Generic Service Interfacing Services provided by the load management system and example power systems, e.g., on demand ordering service, demand response management service, are developed and exposed in a generic way, A_ITF, shown in Fig. 3, to enable the collaboration over a heterogeneous networking environment. Different from the existing Web Services [8] and UPnP [9] specifications, where services only contain interfaces which express services capabilities, A_ITF defines that interfaces of a service can be divided into two types: provided interface and required interface. Capabilities of a service are expressed as provided interfaces; capabilities a service needs for its work are specified as required interfaces. Service compositions are created by connecting (binding) these required and provided interfaces. Special interfaces are used to program the extra-functional aspects including security, management and discovery, but also the mentioned binding. Separate orchestrators are capable of searching services and connecting them to form applications; orchestrators can also expose themselves again as services. In this way, applications can be achieved by service collaboration. More importantly, services have the ability to search for the functionalities they require through the network. This can solve the problem that application logic is encapsulated within services and dramatically enhance the reusability of services and the flexibility of the system [10]. All published methods of a service are added to the function interface. A_ITF is designed to support two service advertisement mechanisms: the mediated way which is achieved through a repository and the immediate way when there is no repository available on the network. In an immediate discovery protocol, a service broadcasts advertisements and queries while it listens to messages of broadcasted advertisements and queries. In case a service requires some interfaces from other services, it keeps a list of these services when it receives the advertisement messages from them. A service can subscribe to the events generated by another service. The Event Generator provides methods to register and unregister event listeners, as well as a method to inform all registered event listeners of the occurrence of an event. The Event Listener interface provides a callback method that can be called by an event generator once subscribed events occur. The purpose of the binding interface is to bind a required interface of a service to another service that provides that matching function interface. 2.4 Role-Based Access Control In order to protect smart grids from malicious attack and protect the privacy of consumers, smart grids services can be added with security-related interfaces. Consequently, only authenticated users can access them. Service discovery, access, and collaboration all happen in a trustworthy environment. The security interface, illustrated in Fig. 4, is used for checking the identification and capability of a service user, which can be fetched from a ticket, to access a smart grids service. All activities including advertisement, discovery, access and collaboration can only be executed with carrying a valid ticket. Only authenticated users can access a service and

5 Service-Oriented Advanced Metering Infrastructure for Smart Grids 459 Fig. 3 Static view of A_ITF. Asymmetric cryptography [11] is used for communication secrecy. The cryptographic key pair for encryption and decryption is distributed by the CA. 3. Implementation and Analysis Fig. 4 A_ITF with security related interface. communication messages are encrypted. Due to the fact that power systems are distributed, a single-sign-on mechanism is supported by this security interface. Different access actions are granted to different service users according to their roles. For instance, a consumer has to show his ticket signed by a trusted third party Certificate Authorization (CA) and the system administrator can specify which access actions are permitted to different roles. In this way, each access to a service has to verify that it is authorized. Moreover, all exchanged messages in smart grids are encrypted. To address the feasibility of this service-oriented AMI, we have developed a tooling support, A_MAP, to wrap a deployment platform independent A_ITF service into a deployment platform specific service. Currently, to deploy a smart grids service in type of Web Service is supported. The structure of A_MAP is depicted in Fig. 5. Besides AMI, the proposed service-oriented design is suitable for other modules in smart grids including Advanced Distribution Operations (ADO), Advanced Transmission Operations (ATO) and Advanced Asset Management (AAM). With the flexibility provided by the generic service interfacing, real time simulation, distributed operation, network optimization can be achieved with low-cost.

6 460 Service-Oriented Advanced Metering Infrastructure for Smart Grids Fig. 5 A_MAP overview. 4. Conclusions This paper presents a service-oriented AMI for smart grids to solve the intercommunication problem of current power systems. System functionalities are wrapped as scalable smart grids services exposing generic interfaces defined by A_ITF. A mapping tool, A_MAP, is developed to wrap a deployment platform independent smart grids services as Web Services. It supports the seamless interactions of heterogeneous systems where issues including flexibility, reliability and security are considered. With achieved seamless communication, this service-oriented AMI can associate consumers with actual system workload, furthermore support the intelligent running of power systems and meanwhile providing a trust and secure environment for smart grids. Acknowledgments We thank Melissa Tjiong and Remi Bosman for their technical feedback at the design and implementation stages of this work. We also thank our anonymous reviewers for their invaluable feedback which helped in improving the quality of the paper. References [1] M.C. Kintner-Meyer, D.P. Chassin, L.D. Kannberg, R.G. Pratt, J.G. DeSteese, L.A. Schienbein, et al., GridWise: The benefits of a transformed energy system, Pacific Northwest National Laboratory under Contract with the United States Department of Energy, 2008, p. 25. [2] M. Amin, B.F. Wollenberg, Toward a smart grid: Power delivery for the 21st century, IEEE Power and Energy Magazine 3 (5) (2005) [3] Cisco Outlines Strategy for Highly Secure, Smart Grid Infrastructure, 2009, available online at: [4] B. Loeff, AMI Anatomy: Core Technologies in Advanced Metering, Ultrimetrics Newsletter (Automatic Meter Reading Association), 2008, available online at: [5] Rochester Gas and Electric Corporation and New York State Electric and Gas Company, Advanced Metering Infrastructure Overview and Plan, 2007, available online at: Filing.pdf. [6] A. Korostelev, J.J. Lukkien, J. Nesvadba, Y. Qian, QoS management in distributed service oriented systems, Parallel and distributed computing and networks, in: Proc of IASTED Int. Conf. on Parallel and Distributed Computing and Networks, Innsbruck, Austria, Feb., [7] S. Chen, W. Zhang, F. Ma, A cooperative computing platform for drug discovery and design, in: IEEE Service Computing Conference, 2004, pp [8] E. Cerami, Web Services Essentials: Distributed Applications with XML-RPC, SOAP, UDDI & WSDL, O Reilly, [9] UPnP Forum, UPnP Device Architecture, Version 1.0, available online at: ecture-v1.0.pdf, [10] S. Chen, J. Lukkien, R. Bosman, R. Verhoeven, A generic service interfacing approach for home networking, in: IEEE International Conference on Consumer Electronics, 2010, pp [11] R. Housley, W. Ford, W. Polk, D. Solo, Internet X.509 Public Key Infrastructure: Certificate and CRL Profile, available online at:

A generic service architecture for secure ubiquitous computing systems Chen, S.; Lukkien, J.J.; Verhoeven, P.H.F.M.

A generic service architecture for secure ubiquitous computing systems Chen, S.; Lukkien, J.J.; Verhoeven, P.H.F.M. A generic service architecture for secure ubiquitous computing systems Chen, S.; Lukkien, J.J.; Verhoeven, P.H.F.M. Published in: International Journal of Communications, Network and System Sciences DOI:

More information

A Generic Service Architecture for Secure Ubiquitous Computing Systems

A Generic Service Architecture for Secure Ubiquitous Computing Systems Int. J. Communications, Network and System Sciences, 2012, 5, 50-65 http://dx.doi.org/10.4236/ijcns.2012.51007 Published Online January 2012 (http://www.scirp.org/journal/ijcns) A Generic Service Architecture

More information

SOFTWARE ARCHITECTURES ARCHITECTURAL STYLES SCALING UP PERFORMANCE

SOFTWARE ARCHITECTURES ARCHITECTURAL STYLES SCALING UP PERFORMANCE SOFTWARE ARCHITECTURES ARCHITECTURAL STYLES SCALING UP PERFORMANCE Tomas Cerny, Software Engineering, FEE, CTU in Prague, 2014 1 ARCHITECTURES SW Architectures usually complex Often we reduce the abstraction

More information

UNICORE Globus: Interoperability of Grid Infrastructures

UNICORE Globus: Interoperability of Grid Infrastructures UNICORE : Interoperability of Grid Infrastructures Michael Rambadt Philipp Wieder Central Institute for Applied Mathematics (ZAM) Research Centre Juelich D 52425 Juelich, Germany Phone: +49 2461 612057

More information

Agent-Enabling Transformation of E-Commerce Portals with Web Services

Agent-Enabling Transformation of E-Commerce Portals with Web Services Agent-Enabling Transformation of E-Commerce Portals with Web Services Dr. David B. Ulmer CTO Sotheby s New York, NY 10021, USA Dr. Lixin Tao Professor Pace University Pleasantville, NY 10570, USA Abstract:

More information

Enabling Smart Energy as a Service via 5G Mobile Network advances. The Energy as a Service: when the Smart Energy uses the 5G technology

Enabling Smart Energy as a Service via 5G Mobile Network advances. The Energy as a Service: when the Smart Energy uses the 5G technology Enabling Smart Energy as a Service via 5G Mobile Network advances The Energy as a Service: when the Smart Energy uses the 5G technology Ljubljana, 5G PPP Phase 3 Stakeholders Info day October 17 2017 Fiorentino

More information

Building Distributed Access Control System Using Service-Oriented Programming Model

Building Distributed Access Control System Using Service-Oriented Programming Model Building Distributed Access Control System Using Service-Oriented Programming Model Ivan Zuzak, Sinisa Srbljic School of Electrical Engineering and Computing, University of Zagreb, Croatia ivan.zuzak@fer.hr,

More information

Enabling Smart Energy as a Service via 5G Mobile Network advances

Enabling Smart Energy as a Service via 5G Mobile Network advances NR 5 Enabling Smart Energy as a Service via 5G Mobile Network advances 5G-PPP Phase 2 at EuCNC Oulu Fiorentino Giampaolo giampaolo.fiorentino@eng.it SCOPE MOTIVATION NR 5 Insights behind... The state of

More information

NGSON: Features, State of the Art, and Realization

NGSON: Features, State of the Art, and Realization NEXT GENERATION SERVICE OVERLAY NETWORKS (NGSON) NGSON: Features, State of the Art, and Realization Seung-Ik Lee and Shin-Gak Kang, Standards Research Center, Electronics and Telecommunications Research

More information

A Secure Routing Protocol for Wireless Adhoc Network Creation

A Secure Routing Protocol for Wireless Adhoc Network Creation Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.88

More information

Distributed Service Discovery Algorithm Based on Ant Colony Algorithm

Distributed Service Discovery Algorithm Based on Ant Colony Algorithm 70 JOURNAL OF SOFTWARE, VOL. 9, NO. 1, JANUARY 2014 Distributed Service Discovery Algorithm Based on Ant Colony Algorithm Chijun Zhang College of Management Science and Information Engineering, Jilin University

More information

Globus Toolkit Firewall Requirements. Abstract

Globus Toolkit Firewall Requirements. Abstract Globus Toolkit Firewall Requirements v0.3 8/30/2002 Von Welch Software Architect, Globus Project welch@mcs.anl.gov Abstract This document provides requirements and guidance to firewall administrators at

More information

Semantic SOA - Realization of the Adaptive Services Grid

Semantic SOA - Realization of the Adaptive Services Grid Semantic SOA - Realization of the Adaptive Services Grid results of the final year bachelor project Outline review of midterm results engineering methodology service development build-up of ASG software

More information

Service-Oriented Architecture (SOA)

Service-Oriented Architecture (SOA) Service-Oriented Architecture (SOA) SOA is a software architecture in which reusable services are deployed into application servers and then consumed by clients in different applications or business processes.

More information

Securing the Smart Grid. Understanding the BIG Picture 11/1/2011. Proprietary Information of Corporate Risk Solutions, Inc. 1.

Securing the Smart Grid. Understanding the BIG Picture 11/1/2011. Proprietary Information of Corporate Risk Solutions, Inc. 1. Securing the Smart Grid Understanding the BIG Picture The Power Grid The electric power system is the most capital-intensive infrastructure in North America. The system is undergoing tremendous change

More information

OpenWay by Itron Security Overview

OpenWay by Itron Security Overview Itron White Paper OpenWay by Itron OpenWay by Itron Security Overview Kip Gering / R. Eric Robinson Itron Marketing / Itron Engineering 2009, Itron Inc. All rights reserved. 1 Executive Summary 3 Intent

More information

Panel 1 Service Platform and Network Infrastructure for Ubiquitous Services

Panel 1 Service Platform and Network Infrastructure for Ubiquitous Services Panel 1 Platform and Network Infrastructure for Ubiquitous s Wolfgang Kellerer DoCoMo Euro-Labs Munich, Germany WWRF WG2 ( Architecture) Vice Chair DoCoMo Communications Landsberger Str. 312 80687 Munich

More information

A Web Services Based Platform for Exchange of Procedural CAD Models

A Web Services Based Platform for Exchange of Procedural CAD Models A Web Services Based Platform for Exchange of Procedural CAD Models Xiang Chen, Min Li, Shuming Gao State Key Laboratory of CAD&CG, Zhejiang University (310027) {xchen, limin, smgao}@cad.zju.edu.cn Abstract

More information

Cyber-Physical Chain (CPChain) Light Paper

Cyber-Physical Chain (CPChain) Light Paper Cyber-Physical Chain (CPChain) Light Paper Decentralized Infrastructure for Next Generation Internet of Things Cyber-Physical Chain (CPChain) Team December 10, 2017 Abstract Deeply integrating blockchain

More information

Deliverable D8.4 Certificate Transparency Log v2.0 Production Service

Deliverable D8.4 Certificate Transparency Log v2.0 Production Service 16-11-2017 Certificate Transparency Log v2.0 Production Contractual Date: 31-10-2017 Actual Date: 16-11-2017 Grant Agreement No.: 731122 Work Package/Activity: 8/JRA2 Task Item: Task 6 Nature of Deliverable:

More information

Integration of Wireless Sensor Networks with a Service-Oriented Architecture

Integration of Wireless Sensor Networks with a Service-Oriented Architecture TECHNISCHE UNIVERSITEIT EINDHOVEN Department of Mathematics and Computer Science MASTER S THESIS Integration of Wireless Sensor Networks with a Service-Oriented Architecture by M.P. de Vos Supervisor:

More information

2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising

More information

EXPERIENCE WITH PKI IN A LARGE-SCALE DISTRIBUTED ENVIRONMENT

EXPERIENCE WITH PKI IN A LARGE-SCALE DISTRIBUTED ENVIRONMENT EXPERIENCE WITH PKI IN A LARGE-SCALE DISTRIBUTED ENVIRONMENT Daniel Kouřil, Michal Procházka, Luděk Matyska CESNET z. s. p. o., Zikova 4, 160 00 Praha 6, Czech Republic, and Masaryk University, Botanická

More information

ICENI: An Open Grid Service Architecture Implemented with Jini Nathalie Furmento, William Lee, Anthony Mayer, Steven Newhouse, and John Darlington

ICENI: An Open Grid Service Architecture Implemented with Jini Nathalie Furmento, William Lee, Anthony Mayer, Steven Newhouse, and John Darlington ICENI: An Open Grid Service Architecture Implemented with Jini Nathalie Furmento, William Lee, Anthony Mayer, Steven Newhouse, and John Darlington ( Presentation by Li Zao, 01-02-2005, Univercité Claude

More information

Virtual Community Management for Enabling P2P Services in the IMS Network

Virtual Community Management for Enabling P2P Services in the IMS Network Virtual Community Management for Enabling P2P Services in the IMS Network Igor Radovanović, Johan Lukkien, Shudong Chen, Chris Molanus, Tanır Özçelebi Department of Mathematics and Computer Science, Eindhoven

More information

Distributed Automation System based on Java and Web Services

Distributed Automation System based on Java and Web Services Distributed Automation System based on Java and Web Services Nikolay Kakanakov, Mitko Shopov, Grisha Spasov Abstract: The paper presents the implementation of a model for Distributed Automation Systems

More information

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS 1 PRASHANTH JAYAKUMAR, 2 P.S.KHANAGOUDAR, 3 VINAY KAVERI 1,3 Department of CSE, GIT, Belgaum, 2 Assistant Professor, Dept.

More information

Research and Design Application Platform of Service Grid Based on WSRF

Research and Design Application Platform of Service Grid Based on WSRF DOI: 10.7763/IPEDR. 2012. V49. 27 Research and Design Application Platform of Service Grid Based on WSRF Jianmei Ge a, Shying Zhang a College of Computer Science and Technology, Beihua University, No.1

More information

Realizing the Army Net-Centric Data Strategy (ANCDS) in a Service Oriented Architecture (SOA)

Realizing the Army Net-Centric Data Strategy (ANCDS) in a Service Oriented Architecture (SOA) Realizing the Army Net-Centric Data Strategy (ANCDS) in a Service Oriented Architecture (SOA) A presentation to GMU/AFCEA symposium "Critical Issues in C4I" Michelle Dirner, James Blalock, Eric Yuan National

More information

Building blocks: Connectors: View concern stakeholder (1..*):

Building blocks: Connectors: View concern stakeholder (1..*): 1 Building blocks: Connectors: View concern stakeholder (1..*): Extra-functional requirements (Y + motivation) /N : Security: Availability & reliability: Maintainability: Performance and scalability: Distribution

More information

Context-aware Services for UMTS-Networks*

Context-aware Services for UMTS-Networks* Context-aware Services for UMTS-Networks* * This project is partly financed by the government of Bavaria. Thomas Buchholz LMU München 1 Outline I. Properties of current context-aware architectures II.

More information

Sentinet for BizTalk Server SENTINET

Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server 1 Contents Introduction... 2 Sentinet Benefits... 3 SOA and API Repository... 4 Security... 4 Mediation and Virtualization... 5 Authentication

More information

Wireless Sensor Networks and Advanced Metering Infrastructure Deployment in Smart Grid

Wireless Sensor Networks and Advanced Metering Infrastructure Deployment in Smart Grid Wireless Sensor Networks and Advanced Metering Infrastructure Deployment in Smart Grid O. M. Longe, K. Ouahada, H. C. Ferreira, S. Rimer Dept. of Electrical & Electronics Engineering Science, University

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 6, Nov-Dec 2015

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 6, Nov-Dec 2015 RESEARCH ARTICLE OPEN ACCESS Middleware Interoperability using SOA for Enterprise Business Application T Sathis Kumar Assistant Professor Department of Computer Science and Engineering Saranathan College

More information

Web Services Development for IBM WebSphere Application Server V7.0

Web Services Development for IBM WebSphere Application Server V7.0 000-371 Web Services Development for IBM WebSphere Application Server V7.0 Version 3.1 QUESTION NO: 1 Refer to the message in the exhibit. Replace the??? in the message with the appropriate namespace.

More information

Study on Ontology-based Multi-technologies Supported Service-Oriented Architecture

Study on Ontology-based Multi-technologies Supported Service-Oriented Architecture International Conference on Education Technology, Management and Humanities Science (ETMHS 2015) Study on Ontology-based Multi-technologies Supported Service-Oriented Architecture GaiHai Li a, Gang Huang

More information

(9A05803) WEB SERVICES (ELECTIVE - III)

(9A05803) WEB SERVICES (ELECTIVE - III) 1 UNIT III (9A05803) WEB SERVICES (ELECTIVE - III) Web services Architecture: web services architecture and its characteristics, core building blocks of web services, standards and technologies available

More information

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data An Efficient Privacy-Preserving Ranked Keyword Search Method Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop

More information

A Two-Fold Authentication Mechanism for Network Security

A Two-Fold Authentication Mechanism for Network Security Asian Journal of Engineering and Applied Technology ISSN 2249-068X Vol. 7 No. 2, 2018, pp. 86-90 The Research Publication, www.trp.org.in A Two-Fold for Network Security D. Selvamani 1 and V Selvi 2 1

More information

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI

More information

Routing Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-hoc Network

Routing Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-hoc Network Routing Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-hoc Network Md. Golam Kaosar Victoria University, Australia golam.kaosar@vu.edu.au Abstract Mobile Ad-hoc Network

More information

SMart esolutions Information Security

SMart esolutions Information Security Information Security Agenda What are SMart esolutions? What is Information Security? Definitions SMart esolutions Security Features Frequently Asked Questions 12/6/2004 2 What are SMart esolutions? SMart

More information

The Grid Authentication System for Mobile Grid Environment

The Grid Authentication System for Mobile Grid Environment IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 02, 2014 ISSN (online): 2321-0613 The Grid Authentication System for Mobile Grid Environment A.Sudha 1 S.M.Karpagavalli

More information

The Impact of SOA Policy-Based Computing on C2 Interoperation and Computing. R. Paul, W. T. Tsai, Jay Bayne

The Impact of SOA Policy-Based Computing on C2 Interoperation and Computing. R. Paul, W. T. Tsai, Jay Bayne The Impact of SOA Policy-Based Computing on C2 Interoperation and Computing R. Paul, W. T. Tsai, Jay Bayne 1 Table of Content Introduction Service-Oriented Computing Acceptance of SOA within DOD Policy-based

More information

A Way to Personalize In-Home Healthcare and Assisted Living

A Way to Personalize In-Home Healthcare and Assisted Living Knowledge Foundation A Way to Personalize In-Home Healthcare and Assisted Living Wagner Ourique de Morais CERES Centre for Research on Embedded Systems CAISR Centre for Applied Intelligent Systems Research

More information

A Distributed DRM Platform Based on a Web-Oriented Watermarking Protocol

A Distributed DRM Platform Based on a Web-Oriented Watermarking Protocol A Distributed DRM Platform Based on a Web-Oriented Watermarking Protocol FRANCO FRATTOLILLO, SALVATORE D ONOFRIO Research Centre on Software Technology Department of Engineering, University of Sannio Corso

More information

Smart Grid. Carbon Masters Whatcom County Extension October, Anjan Bose Washington State University Pullman, WA, USA

Smart Grid. Carbon Masters Whatcom County Extension October, Anjan Bose Washington State University Pullman, WA, USA Smart Grid Anjan Bose Washington State University Pullman, WA, USA Carbon Masters Whatcom County Extension October, 2010 What is a SMART Grid? Self-heals Motivates and includes the consumer Resists attack

More information

New Value Chain through Service Platform

New Value Chain through Service Platform New Value Chain through Service Platform Oct. 24 th 2008 Ryozo Ito Senior Executive Consultant Hewlett-Packard Japan Technology for better business outcomes 2008 Hewlett-Packard Development Company, L.P.

More information

Oracle SOA Suite 11g: Build Composite Applications

Oracle SOA Suite 11g: Build Composite Applications Oracle University Contact Us: 1.800.529.0165 Oracle SOA Suite 11g: Build Composite Applications Duration: 5 Days What you will learn This course covers designing and developing SOA composite applications

More information

WSDL Interface of Services for Distributed Search in Databases

WSDL Interface of Services for Distributed Search in Databases WSDL Interface of s for Distributed Search in s Elena Ivanova Abstract: oriented architecture and two layers model of a service are described. WSDL technology is applied to implement a network interface

More information

Service-Oriented Computing in Recomposable Embedded Systems

Service-Oriented Computing in Recomposable Embedded Systems Service-Oriented Computing in Recomposable Embedded Systems Autonomous + Backend Support Yinong Chen Department of Computer Science and Engineering http://www.public.asu.edu/~ychen10/ 2 Motivation Embedded

More information

A Framework Supporting Quality of Service for SOA-based Applications

A Framework Supporting Quality of Service for SOA-based Applications A Framework Supporting Quality of Service for SOA-based Applications Phung Huu Phu, Dae Seung Yoo, and Myeongjae Yi School of Computer Engineering and Information Technology University of Ulsan, Republic

More information

Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning

Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning Sapna B Kulkarni,B.E,MTech (PhD) Associate Prof, Dept of CSE RYM Engg.college, Bellari VTU Belgaum Shainaj.B

More information

Semantic Web. Semantic Web Services. Morteza Amini. Sharif University of Technology Spring 90-91

Semantic Web. Semantic Web Services. Morteza Amini. Sharif University of Technology Spring 90-91 بسمه تعالی Semantic Web Semantic Web Services Morteza Amini Sharif University of Technology Spring 90-91 Outline Semantic Web Services Basics Challenges in Web Services Semantics in Web Services Web Service

More information

A Self Analysing and Reliable SOA Model

A Self Analysing and Reliable SOA Model A Self Analysing and Reliable SOA Model Prachet Bhuyan #, Asima Das #, Durga Prasad Mohapatra * # School of Computer Engineering, KIIT University, Bhubaneswar, Odisha, India * Department of Computer Science

More information

Cisco 5921 Embedded Services Router

Cisco 5921 Embedded Services Router Data Sheet Cisco 5921 Embedded Services Router The Cisco 5921 Embedded Services Router (ESR) is a Cisco IOS software router application. It is designed to operate on small, low-power, Linux-based platforms

More information

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:

More information

DESIGN OF WEB SERVICE SINGLE SIGN-ON BASED ON TICKET AND ASSERTION

DESIGN OF WEB SERVICE SINGLE SIGN-ON BASED ON TICKET AND ASSERTION DESIGN OF WEB SERVICE SINGLE SIGN-ON BASED ON TICKET AND ASSERTION Abstract: 1 K.Maithili, 2 R.Ruhin Kouser, 3 K.Suganya, 1,2,3 Assistant Professor, Department of Computer Science Engineering Kingston

More information

Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions

Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions Chapter 1: Solving Integration Problems Using Patterns 2 Introduction The Need for Integration Integration Challenges

More information

IEEE 2013 JAVA PROJECTS Contact No: KNOWLEDGE AND DATA ENGINEERING

IEEE 2013 JAVA PROJECTS  Contact No: KNOWLEDGE AND DATA ENGINEERING IEEE 2013 JAVA PROJECTS www.chennaisunday.com Contact No: 9566137117 KNOWLEDGE AND DATA ENGINEERING (DATA MINING) 1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data

More information

Next Paradigm for Decentralized Apps. Table of Contents 1. Introduction 1. Color Spectrum Overview 3. Two-tier Architecture of Color Spectrum 4

Next Paradigm for Decentralized Apps. Table of Contents 1. Introduction 1. Color Spectrum Overview 3. Two-tier Architecture of Color Spectrum 4 Color Spectrum: Next Paradigm for Decentralized Apps Table of Contents Table of Contents 1 Introduction 1 Color Spectrum Overview 3 Two-tier Architecture of Color Spectrum 4 Clouds in Color Spectrum 4

More information

The Cryptographic Sensor

The Cryptographic Sensor The Cryptographic Sensor Libor Dostálek and Václav Novák {libor.dostalek, vaclav.novak}@prf.jcu.cz Faculty of Science University of South Bohemia České Budějovice Abstract The aim is to find an effective

More information

JBI Components: Part 1 (Theory)

JBI Components: Part 1 (Theory) 1 Introduction JBI s: Part 1 (Theory) Ron Ten-Hove, Sun Microsystems Copyright 2006, Sun Microsystems, Inc. JBI components are where the SOA rubber hits the road: they provide and use the services that

More information

Implementation Method of OGC Web Map Service Based on Web Service. Anthony Wenjue Jia *,Yumin Chen *,Jianya Gong * *Wuhan University

Implementation Method of OGC Web Map Service Based on Web Service. Anthony Wenjue Jia *,Yumin Chen *,Jianya Gong * *Wuhan University Implementation Method of OGC Web Map Service Based on Web Service Anthony Wenjue Jia *,Yumin Chen *,Jianya Gong * *Wuhan University ABSTRACT The most important advantage of web service is the multi-platform,

More information

Strong Authentication for Web Services using Smartcards

Strong Authentication for Web Services using Smartcards Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2009 Strong Authentication for Web Services using Smartcards D S. Stienne

More information

A Web Service for Exchanging Procedural CAD Models between heterogeneous CAD systems

A Web Service for Exchanging Procedural CAD Models between heterogeneous CAD systems A Web Service for Exchanging Procedural CAD Models between heterogeneous CAD systems Xiang Chen, Min Li, Shuming Gao State Key Laboratory of CAD&CG, Zhejiang University (310027) {xchen, limin, smgao}@cad.zju.edu.cn

More information

Mobile Security Fall 2012

Mobile Security Fall 2012 Mobile Security 14-829 Fall 2012 Patrick Tague Class #9 The Internet of Things Partial slide credit to L. Zoia and Y. Zhang Announcements If you haven't signed up for a Survey presentation (two teams,

More information

An Efficient Image Processing Method Based on Web Services for Mobile Devices

An Efficient Image Processing Method Based on Web Services for Mobile Devices An Efficient Image Processing Method Based on Web Services for Mobile Devices Yi Liang a,b a Tianjin Key Lab of Intelligent Computing & Novel Software Technology, Tianjin University of Technology Tianjin,

More information

Mobile ad hoc networks Various problems and some solutions

Mobile ad hoc networks Various problems and some solutions Mobile ad hoc networks Various problems and some solutions Humayun Bakht School of Computingand Mathematical Sciences Liverpool John Mores University Email:humayunbakht@yahoo.co.uk Main Focus Problems

More information

Collaborative Framework for Testing Web Application Vulnerabilities Using STOWS

Collaborative Framework for Testing Web Application Vulnerabilities Using STOWS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,

More information

DS 2009: middleware. David Evans

DS 2009: middleware. David Evans DS 2009: middleware David Evans de239@cl.cam.ac.uk What is middleware? distributed applications middleware remote calls, method invocations, messages,... OS comms. interface sockets, IP,... layer between

More information

Web Services Architecture Directions. Rod Smith, Donald F Ferguson, Sanjiva Weerawarana IBM Corporation

Web Services Architecture Directions. Rod Smith, Donald F Ferguson, Sanjiva Weerawarana IBM Corporation Web Services Architecture Directions Rod Smith, Donald F Ferguson, Sanjiva Weerawarana 1 Overview Today s Realities Web Services Architecture Elements Web Services Framework Conclusions & Discussion 2

More information

Security Technologies for Dynamic Collaboration

Security Technologies for Dynamic Collaboration Special Issue Advanced Technologies Driving Dynamic Collaboration Featuring System Technologies Security Technologies for Dynamic Collaboration By Hiroshi MIYAUCHI,* Ayako KOMATSU, Masato KAWATSU and Masashi

More information

Secure Development Lifecycle

Secure Development Lifecycle Secure Development Lifecycle Strengthening Cisco Products The Cisco Secure Development Lifecycle (SDL) is a repeatable and measurable process designed to increase Cisco product resiliency and trustworthiness.

More information

MASP Chapter on Safety and Security

MASP Chapter on Safety and Security MASP Chapter on Safety and Security Daniel Watzenig Graz, Austria https://artemis.eu MASP Chapter on Safety & Security Daniel Watzenig daniel.watzenig@v2c2.at Francois Tuot francois.tuot@gemalto.com Antonio

More information

Chapter 8 Web Services Objectives

Chapter 8 Web Services Objectives Chapter 8 Web Services Objectives Describe the Web services approach to the Service- Oriented Architecture concept Describe the WSDL specification and how it is used to define Web services Describe the

More information

A Ubiquitous Web Services Framework for Interoperability in Pervasive Environments

A Ubiquitous Web Services Framework for Interoperability in Pervasive Environments A Ubiquitous Web Services Framework for Interoperability in Pervasive Environments Hyung-Jun Yim and Kyu-Chul Lee * Dept. of Computer Engineering, Chungnam National University 220 Gung-Dong, Yuseong-Gu,

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 6 Release 1 System i Security Digital Certificate Manager Version 6 Release 1 Note Before using this information and the product it supports, be sure

More information

CAS 703 Software Design

CAS 703 Software Design Dr. Ridha Khedri Department of Computing and Software, McMaster University Canada L8S 4L7, Hamilton, Ontario Acknowledgments: Material based on Software by Tao et al. (Chapters 9 and 10) (SOA) 1 Interaction

More information

Chapter 17 Web Services Additional Topics

Chapter 17 Web Services Additional Topics Prof. Dr.-Ing. Stefan Deßloch AG Heterogene Informationssysteme Geb. 36, Raum 329 Tel. 0631/205 3275 dessloch@informatik.uni-kl.de Chapter 17 Web Services Additional Topics Prof. Dr.-Ing. Stefan Deßloch

More information

MPEG-21: The 21st Century Multimedia Framework

MPEG-21: The 21st Century Multimedia Framework MPEG-21: The 21st Century Multimedia Framework Jan Bormans, Jean Gelissen, and Andrew Perkis IEEE Signal Processing Magazine, March 2003 Outline Context and motivation of MPEG-21 An overview of MPEG-21

More information

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report Mandadapu Sravya M.Tech, Department of CSE, G. Narayanamma Institute of Technology and Science. Ch.Mandakini

More information

Introduction to Grid Technology

Introduction to Grid Technology Introduction to Grid Technology B.Ramamurthy 1 Arthur C Clarke s Laws (two of many) Any sufficiently advanced technology is indistinguishable from magic." "The only way of discovering the limits of the

More information

An agent-based peer-to-peer grid computing architecture

An agent-based peer-to-peer grid computing architecture University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2005 An agent-based peer-to-peer grid computing architecture J. Tang University

More information

C exam. IBM C IBM WebSphere Application Server Developer Tools V8.5 with Liberty Profile. Version: 1.

C exam.   IBM C IBM WebSphere Application Server Developer Tools V8.5 with Liberty Profile. Version: 1. C9510-319.exam Number: C9510-319 Passing Score: 800 Time Limit: 120 min File Version: 1.0 IBM C9510-319 IBM WebSphere Application Server Developer Tools V8.5 with Liberty Profile Version: 1.0 Exam A QUESTION

More information

Implementing a Ground Service- Oriented Architecture (SOA) March 28, 2006

Implementing a Ground Service- Oriented Architecture (SOA) March 28, 2006 Implementing a Ground Service- Oriented Architecture (SOA) March 28, 2006 John Hohwald Slide 1 Definitions and Terminology What is SOA? SOA is an architectural style whose goal is to achieve loose coupling

More information

IBM. Security Digital Certificate Manager. IBM i 7.1

IBM. Security Digital Certificate Manager. IBM i 7.1 IBM IBM i Security Digital Certificate Manager 7.1 IBM IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in

More information

Open mustard seed. Patrick Deegan, Ph.D. ID3

Open mustard seed. Patrick Deegan, Ph.D. ID3 Open mustard seed Patrick Deegan, Ph.D. ID3 OpenSocial FSN (draft) August 8, 2013 Open Mustard Seed (OMS) Introduction The OMS Trustworthy Compute Framework (TCF) extends the core functionality of Personal

More information

Workshop on Web of Services for Enterprise Computing

Workshop on Web of Services for Enterprise Computing Workshop on Web of Services for Enterprise Computing Fujitsu Submission v0.2 Authors: Jacques Durand Tom Rutt Hamid BenMalek Acknowledgements: Masahiko Narita Paul A. Knapp 1. The Great Divide The fundamental

More information

A Messaging-Based Integration Architecture for Print Production Workflow Systems

A Messaging-Based Integration Architecture for Print Production Workflow Systems A Messaging-Based Integration Architecture for Print Production Workflow Systems Claes Buckwalter Digital Media, ITN, Linköping University, Sweden Abstract A print production workflow consists of a number

More information

Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen SUN

Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen SUN 2016 International Conference on Wireless Communication and Network Engineering (WCNE 2016) ISBN: 978-1-60595-403-5 Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen

More information

Proximity-Aware Location Based Collaborative Sensing for Energy-Efficient Mobile Devices

Proximity-Aware Location Based Collaborative Sensing for Energy-Efficient Mobile Devices Volume 03 - Issue 10 October 2018 PP. 30-34 Proximity-Aware Location Based Collaborative Sensing for Energy-Efficient Mobile Devices Pranav Nair 1, Hitesh Patil 2, Tukaram Gore 3, Yogesh Jadhav 4 1 (Computer

More information

Server-based Certificate Validation Protocol

Server-based Certificate Validation Protocol Server-based Certificate Validation Protocol Digital Certificate and PKI a public-key certificate is a digital certificate that binds a system entity's identity to a public key value, and possibly to additional

More information

Dynamic Neighbor Positioning In Manet with Protection against Adversarial Attacks

Dynamic Neighbor Positioning In Manet with Protection against Adversarial Attacks International Journal of Computational Engineering Research Vol, 03 Issue, 4 Dynamic Neighbor Positioning In Manet with Protection against Adversarial Attacks 1, K. Priyadharshini, 2, V. Kathiravan, 3,

More information

A Data-Centric Approach for Modular Assurance Abstract. Keywords: 1 Introduction

A Data-Centric Approach for Modular Assurance Abstract. Keywords: 1 Introduction A Data-Centric Approach for Modular Assurance Gabriela F. Ciocarlie, Heidi Schubert and Rose Wahlin Real-Time Innovations, Inc. {gabriela, heidi, rose}@rti.com Abstract. A mixed-criticality system is one

More information

F O U N D A T I O N. OPC Unified Architecture. Specification. Part 1: Concepts. Version 1.00

F O U N D A T I O N. OPC Unified Architecture. Specification. Part 1: Concepts. Version 1.00 F O U N D A T I O N Unified Architecture Specification Part 1: Concepts Version 1.00 July 28, 2006 Unified Architecture, Part 1 iii Release 1.00 CONTENTS Page FOREWORD... vi AGREEMENT OF USE... vi 1 Scope...

More information

Remote Entrusting of Mobile Multi-Agent Systems

Remote Entrusting of Mobile Multi-Agent Systems Remote Entrusting of Mobile Multi-Agent Systems Kevin Jones kij@dmu.ac.uk http://www.cse.dmu.ac.uk/~kij Re-Trust 08 - Trento, Italy 16 th October 2008 Itinerary Mobile- Agent Systems Remote Entrusting

More information

SERVICE DISCOVERY IN MOBILE PEER-TO-PEER ENVIRONMENT

SERVICE DISCOVERY IN MOBILE PEER-TO-PEER ENVIRONMENT SERVICE DISCOVERY IN MOBILE PEER-TO-PEER ENVIRONMENT Arto Hämäläinen Lappeenranta University of Technology P.O. Box 20, 53851 Lappeenranta, Finland arto.hamalainen@lut.fi Jari Porras Lappeenranta University

More information

Security in the Web Services Framework

Security in the Web Services Framework Security in the Web Services Framework Chen Li and Claus Pahl Dublin City University School of Computing Dublin 9 Ireland Abstract The Web Services Framework provides techniques to enable the application-toapplication

More information

IBM Research Report. A Web-Services-Based Deployment Framework in Grid Computing Environment

IBM Research Report. A Web-Services-Based Deployment Framework in Grid Computing Environment RC 22470 (W0205-219) May 31, 2002 IBM Research Report A Web--Based Deployment Framework in Grid Computing Environment Zongwei Luo, Shyh-Kwei Chen, Santhosh Kumaran, Liang-Jie Zhang, Jen-Yao Chung, Henry

More information